SlideShare a Scribd company logo
Digital
Steganography
Nikunj Dhameliya
Student @ gvp
Outline
 What is Steganography?
 Uses of Steganography
 Its Relation to Cryptography
 Digital Watermarking
 Network Security and Steganography
 Types of Steganography
 Detecting Steganography: Steganalysis
 Future of Steganography
What is Steganography?
 The word 'Steganography' comes from greek words
steganos and graphein.
 It combination of two words:
 steganos: covered,protected,secret
 graphy: writing
 Definition:
''The Process of concealing messages or information within
other non-secret text or data''
History of Steganography
 The first record uses of steganography can be
tracked back to 440 B.C when Herodotus menssion
two example in his histories.
 World War II the french Resistence send message
on back of curriers in invisible ink.
 World War II Germany use microdots
 Modern Steganography - 1985, with the
development of personal computers
 Digital Steganography – with internet
Uses of Steganography
 Governments
 Businesses: Digital Watermarking
 Individuals
Steganography & Cryptography
 Steganography and Cryptography are closely related
 The difference is in their goals...
– Cryptography: although encypted and
unreadable, the existence of data is not hidden
– Steganography: no knowledge of the existence of
the data
 Steganography and Cryptography can be used
together to produce better protection
Digital Watermarking
Image “painted” with the watermark: “Invisible Man” © 1997, Neil F.
Johnson
Digital Watermarking
 Used primarily for identification
 Embedding a unique piece of information within a
medium (typically an image) without noticeably
altering the medium
 Almost impossible to remove without seriously
degrading an image
Digital Steganogaphy & Watermarking
 Digital watermarking hides data in a file, and the act
of hiding data makes it a form or steganography
 The key difference is their goals...
– Steganography: hiding information
– Watermarking: extending the file with extra
information
 Steganographic information must never be apparent
to a viewer unaware of its presence.
Network Security and Steganography
 Confidentiality: any unauthorized person does
not know that sensitive data exists
 Survivability: verifying that the data does not get
destroyed in the transmission
 No detection: cannot be easily found out that the
data is hidden in a given file
 Visibility: people cannot see any visible changes
to the file in which the data is hidden
Types of Digital Steganography
 Hiding a Message inside Text
 Hiding a Message inside Images
– Most popular technique
 Hiding a Message inside Audio and Video
Files
Hiding a Message inside Text
 Partially effective
randoM capitalosis is a rarE disEase ofTen
contrAcTed by careless inTernet users. tHis sad
illnEss causes the aFfected peRsON To randomly
capitalize letters in a bOdy oF texT. please
do not confuse this disease witH a blatant
attEmpt aT steganogRAPhy.
Reveals: MEET AT THE FRONT OF THE TRAP
Hiding a Message inside Text
 First-letter algorithm
 Every n-th character
 Altering the amount of whitespace
 Using a publicly available cover source
Hiding a Message inside Images
 The most popular medium!
 Least-significant bit (LSB) modifications
– 24-bit vs. 8-bit images
– Tools to implement LSB: EzStego and S-Tools
 Masking and Filtering
 Algorithms and Transformations
Hiding an Image within an Image
Removing all but the two least significant bits of each color
component produces an almost completely black image. Making
that image 85 times brighter produces the image below
source: wikipedia.org
Hiding a Message inside Audio or
Videos Files
 Advantages
– Human limitations – 20.000 Hz.
– Large amount of data that can be hidden inside
– Hard to recognize because of the continuous flow
of information (moving stream of images and
sound)
Steganalysis
 Detecting and decoding the hidden data
within a given medium
 Even if secret content is not revealed,
modifying the cover medium changes the
medium’s statistical properties
 Distributed Dictionary Attack
Advantage
 It is used to combine any format of message
to image.
 Peer to peer private communication.
 Posting secret communication on web to
avoid transmission.
 Maintaining anonymity.
Disadvantage
 Someone else with a steganography
detection and cracking tool could expose the
message.
 Better to understand use of standardized
encryption.
Future of Steganography
 The most important use of steganographic
techniques will probably lie in the field of
digital watermarking
 Might become limited under laws -
governments claimed that criminals use
steganography to communicate
...the End

More Related Content

What's hot

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Taha Malampatti
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
kartikeya upadhyay
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESLovely Mnadal
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
steganography
steganographysteganography
steganography
Manika Arora
 
Steganography
Steganography Steganography
Steganography
Humajabeen31
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
Abhishek Singh
 

What's hot (20)

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Email security
Email securityEmail security
Email security
 
Steganography
Steganography Steganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
Girish Chandra
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
International Journal of Engineering Inventions www.ijeijournal.com
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
Steganography
Steganography Steganography
Steganography
Sagar Kumar
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Steganograpy
SteganograpySteganograpy
Steganograpy
arvind carpenter
 
Steganography
SteganographySteganography
Steganography
Divam Goyal
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
iosrjce
 
F017253244
F017253244F017253244
F017253244
IOSR Journals
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
Gerhard Claassen
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
UJJWALPAL15
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
IRJESJOURNAL
 

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography (1)
Steganography (1)Steganography (1)
Steganography (1)
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
F017253244
F017253244F017253244
F017253244
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Majar Project Synopsis (1).docx
Majar Project Synopsis (1).docxMajar Project Synopsis (1).docx
Majar Project Synopsis (1).docx
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Steganography

  • 2. Outline  What is Steganography?  Uses of Steganography  Its Relation to Cryptography  Digital Watermarking  Network Security and Steganography  Types of Steganography  Detecting Steganography: Steganalysis  Future of Steganography
  • 3. What is Steganography?  The word 'Steganography' comes from greek words steganos and graphein.  It combination of two words:  steganos: covered,protected,secret  graphy: writing  Definition: ''The Process of concealing messages or information within other non-secret text or data''
  • 4. History of Steganography  The first record uses of steganography can be tracked back to 440 B.C when Herodotus menssion two example in his histories.  World War II the french Resistence send message on back of curriers in invisible ink.  World War II Germany use microdots  Modern Steganography - 1985, with the development of personal computers  Digital Steganography – with internet
  • 5. Uses of Steganography  Governments  Businesses: Digital Watermarking  Individuals
  • 6. Steganography & Cryptography  Steganography and Cryptography are closely related  The difference is in their goals... – Cryptography: although encypted and unreadable, the existence of data is not hidden – Steganography: no knowledge of the existence of the data  Steganography and Cryptography can be used together to produce better protection
  • 7. Digital Watermarking Image “painted” with the watermark: “Invisible Man” © 1997, Neil F. Johnson
  • 8. Digital Watermarking  Used primarily for identification  Embedding a unique piece of information within a medium (typically an image) without noticeably altering the medium  Almost impossible to remove without seriously degrading an image
  • 9. Digital Steganogaphy & Watermarking  Digital watermarking hides data in a file, and the act of hiding data makes it a form or steganography  The key difference is their goals... – Steganography: hiding information – Watermarking: extending the file with extra information  Steganographic information must never be apparent to a viewer unaware of its presence.
  • 10. Network Security and Steganography  Confidentiality: any unauthorized person does not know that sensitive data exists  Survivability: verifying that the data does not get destroyed in the transmission  No detection: cannot be easily found out that the data is hidden in a given file  Visibility: people cannot see any visible changes to the file in which the data is hidden
  • 11. Types of Digital Steganography  Hiding a Message inside Text  Hiding a Message inside Images – Most popular technique  Hiding a Message inside Audio and Video Files
  • 12. Hiding a Message inside Text  Partially effective randoM capitalosis is a rarE disEase ofTen contrAcTed by careless inTernet users. tHis sad illnEss causes the aFfected peRsON To randomly capitalize letters in a bOdy oF texT. please do not confuse this disease witH a blatant attEmpt aT steganogRAPhy. Reveals: MEET AT THE FRONT OF THE TRAP
  • 13. Hiding a Message inside Text  First-letter algorithm  Every n-th character  Altering the amount of whitespace  Using a publicly available cover source
  • 14. Hiding a Message inside Images  The most popular medium!  Least-significant bit (LSB) modifications – 24-bit vs. 8-bit images – Tools to implement LSB: EzStego and S-Tools  Masking and Filtering  Algorithms and Transformations
  • 15. Hiding an Image within an Image Removing all but the two least significant bits of each color component produces an almost completely black image. Making that image 85 times brighter produces the image below source: wikipedia.org
  • 16. Hiding a Message inside Audio or Videos Files  Advantages – Human limitations – 20.000 Hz. – Large amount of data that can be hidden inside – Hard to recognize because of the continuous flow of information (moving stream of images and sound)
  • 17. Steganalysis  Detecting and decoding the hidden data within a given medium  Even if secret content is not revealed, modifying the cover medium changes the medium’s statistical properties  Distributed Dictionary Attack
  • 18. Advantage  It is used to combine any format of message to image.  Peer to peer private communication.  Posting secret communication on web to avoid transmission.  Maintaining anonymity.
  • 19. Disadvantage  Someone else with a steganography detection and cracking tool could expose the message.  Better to understand use of standardized encryption.
  • 20. Future of Steganography  The most important use of steganographic techniques will probably lie in the field of digital watermarking  Might become limited under laws - governments claimed that criminals use steganography to communicate ...the End